Security

    How A Multinational Bank Handled a Ransom Threat and SSL-Based Attack

    In 2016, the financial services industry suffered 44 million cyber-attacks, more than any other industry. Everything from hacktivist motivated attacks to Internet of Things...

    Matrix VYOM – an Authenticated Multi-tenant Cloud based People Mobility Management Solution

    Traditional applications often prove to be an inadequate solution in catering the needs of SMB and SOHO sized markets. Matrix, an established and award-winning...

    RAH Infotech Becomes the National Distributor for Rapid7 in India and Bangladesh

    RAH Infotech, India’s fastest growing value-added technology distributors, November 23, 2017, announced that it has signed an agreement with Rapid7 a leading provider of...

    Knowing ‘Who’ Really Matters for Reliable Identity Management

    Today large-scale application of Biometrics technology and its generated data is a reality for unique identification purpose of individuals. Biometrics accounts for the measurement...

    Insider Threats and its Impact on Data Security

    Today, organizations around the globe are well aware of the consequences associated with data breaches. Sensitive data that ends up in the wrong hands...

    Why Choose Maxim’s Unclonable Security ICs for Designer’s Intellectual Property

    Designers  who are often at risk of facing attacks to their IPs and products can now safeguard them easily, proactively, and inexpensively with a...

    Protect IP and Deploy Secured Connected Systems with this new CryptoAuthentication Device

    The ATECC608A secure element and new Security Design Partner Program provide the parts and partners needed for designing secure solutions From remote cyber-attacks to the...

    Renesas Delivers Advanced Security for IIoT with Enhanced RX65N/RX651 Microcontrollers

    Renesas Electronics Corporation, a premier supplier of advanced semiconductor solutions, on November 13, 2017, announced the expansion of its popular RX65N/RX651 Group microcontroller(MCU) lineup that...

    Fortinet Recommended in NSS Labs Next-Generation Intrusion Prevention System (NGIPS) Test

    Fortinet, the global leader in high-performance cybersecurity solutions, on November 13, announced the results of the latest NSS Labs Next-Generation Intrusion Prevention System (NGIPS)...

    Car Security to Adopt CalAmp’s Telematics Technology Stack

    Safety of cars is not always at the behest of the driver or the car’s owner, especially when we park them in open places...

    Light + Building 2018: Special show SECURE! Connected Security in Buildings

    Preparations for Light + Building are thoroughly underway and are producing a new highlight, in the shape of “SECURE! Connected Security in Buildings”, in...

    WinMagic Receives Gold Certification from OPSWAT

    WinMagic an award-winning encryption and intelligent key management security solution provider on November 02, 207, announced that is has been awarded Gold certification for...

    Security Fabric Visibility and Protection into the Industrial Internet of Things

    Fortinet, the global leader in high-performance cybersecurity solutions, on November 6, announced its new FortiGuard Industrial Security Service, extending the Fortinet Security Fabric visibility,...

    India among top 7 countries for ransomware circulation : SophosLabs 2018 Malware Forecast

    Ransomware ravaged Windows, but attacks on Android, Linux and MacOS systems also increased in 2017 Just two strains of ransomware were responsible for...

    Sophisticated DDoS Attacks Are Happening Daily. What is your Escape?

    DNS Water Torture attacks, SSL floods, ransom DoS assaults, Advanced Persistent DoS and application flood attacks – all are happening today.  The most important...

    Related News